mcqs bucket

  • Information Technology Mcqs Questions | MCQs Bucket Largest Mcqs Website

    mcqsbucket

      Best guide for exams of all nature, Competitive exams and Interviews
Here is the MCQs guide for the topic of Information Technology. you will find various types of questions along with there answers in this
Q. In 1999, the Melissa virus was a widely publicised:____________?
A.
E-mail virus.
B.
Trojan horse.
C.
acro virus.
D.
Time bomb.


Show Answer
Q. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
A.
Trojan horse
B.
Time bomb
C.
Virus
D.
Time-related bomb sequence


Show Answer
Q. A program that performs a useful task while simultaneously allowing destructive acts is a___________?
A.
Worm
B.
Trojan horse
C.
Virus
D.
Macro virus


Show Answer
Q. Malicious software is known as____________?
A.
Badware
B.
Malware
C.
Maliciousware
D.
Illegalware


Show Answer
Q. Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A.
Spooling
B.
Identity theft
C.
Hacking
D.
Spoofing


Show Answer
Q. The common name for the crime of stealing passwords is____________?
A.
Jacking
B.
Identity theft.
C.
Spoofing
D.
Hacking


Show Answer
Q. The typical computer criminal is a(n)____________?
A.
Young hacker.
B.
Trusted employee with no criminal record.
C.
Trusted employee with a long, but unknown criminal record.
D.
Overseas young cracker.


Show Answer
Q. The computer abbreviation KB usually means____________?
A.
Key Block
B.
Kernel Boot
C.
Kilo Byte
D.
Kit Bit


Show Answer
Q. Which of the following is not a storage medium?
A.
Hard disk
B.
Flash drive
C.
scanner
D.
DVD


Show Answer
Q. Large transaction processing systems in automated organisations use___________?
A.
Online processing
B.
Batch Processing
C.
Once-a-day Processing
D.
End-of-day processing


Show Answer